Sciweavers

270 search results - page 36 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
WSC
2007
13 years 10 months ago
Allocation of resources for hospital evacuations via simulation
Department of Health and Environmental Control (DHEC) issued an order recently requiring that all hospitals have an evacuation plan with the following components: sheltering plan,...
Esengul Tayfur, Kevin Taaffe
IPPS
2007
IEEE
14 years 1 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
VTC
2007
IEEE
14 years 1 months ago
Uplink VoIP Support for 3GPP EUTRA
—Evolved UTRA (EUTRA) is currently under study by 3GPP standards organizations as a long term evolution (LTE) for current generation Universal Terrestrial Radio Access (UTRA) net...
Ravi Nory, Ravi Kuchibhotla, Robert Love, Yakun Su...
VISUALIZATION
2003
IEEE
14 years 25 days ago
Appearance-Preserving View-Dependent Visualization
In this paper a new quadric-based view-dependent simplification scheme is presented. The scheme provides a method to connect mesh simplification controlled by a quadric error metr...
Justin Jang, William Ribarsky, Christopher D. Shaw...
CCS
2007
ACM
14 years 1 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder